You are on page 1of 3

MIS107 Midterm 2a | Covers: Telecom, Security & Ethics, Security Mgt.

Lab Google Sheets


MCQ/TF 10x1 + Broad Question 2x5 = 20 %; Answer all questions
Answer objectively considering the textbook, and lectures. Answer within the context of a manager within an organization.

1 ___ is a fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on
wireless communications.
◯ IP spoofing ◯ SSID ◯ An evil twin ◯ traffic control

2 Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using
a laptop or smartphone.
◯ True ◯ False

3 Coaxial cable, microwave, and fiber optics are examples of ...


◯ Extranets ◯ Telecommunications media ◯ Local area networks (LAN)
◯ Digital ◯ Wide area networks (WAN) ◯ Internet service provider (ISP)

4 Legacy telecommunications technologies do not rely on physical media such as cables or fiber
optics.
◯ True ◯ False

5 End-user computers connect directly with each other to exchange files.


◯ Client/server networks ◯ Metcalfe’s law
◯ Peer-to-peer networks ◯ Digital ◯ Bluetooth

6 The presence of documentation that allows a transaction to be traced through all stages of
information processing is called ...
◯ Computer virus ◯ Cyber Law ◯ Ergonomics
◯ xxx Audit trail ◯ Antivirus software

7 Sending extremely critical, derogatory, and vulgar e-mail messages is called ...
◯ hacking ◯ Flaming ◯ blaming ◯ cracking

8 Interconnected networks need communications processors such as switches, routers, hubs, and
gateways. These are examples of ...
◯ Client/server networks ◯ Digital ◯ Inter-network processors
◯ Peer-to-peer networks ◯ TCP/IP

9 Warcrusing is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using
a laptop or smartphone.
◯ True ◯ False

1 Security appliance (e.g. Cisco ASA) is a unified threat management device, combining several
0 network security functions in one box.
◯ True ◯ False

Bonus: Draw the diagram on the back of this page- “how public key encryption works”.

222-MIS107 Midterm2a NSU ID-> Page 1 of 3


1. Explain five ergonomics risks and how to fix them within the different roles (e.g. Call center operator) of
an organization (e.g. Daraz).

Chosen Organization:

Business role:

Ergonomic risk Explain why and how to fix it

222-MIS107 Midterm2a NSU ID-> Page 2 of 3


2. List five telecommunication processor and explain why an organization (e.g. Daraz) might use them.

Chosen Organization:

Telecom. Processor Business use at chosen organization

222-MIS107 Midterm2a NSU ID-> Page 3 of 3

You might also like